keklick1337 / honeypot-serviceLinks
Honeypot Service Simulator
☆23Updated last year
Alternatives and similar repositories for honeypot-service
Users that are interested in honeypot-service are comparing it to the libraries listed below
Sorting:
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆161Updated 3 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆183Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆140Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- A rigorous IoT scanner based on Shodan.io☆61Updated 8 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated last month
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆178Updated 7 months ago
- A simple vulnerability scanning application built with FastAPI. vulnerability-scanner open-source-security nmap-cve SIEM☆29Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated 9 months ago
- COMPLETE OSINT CHEAT-SHEET☆104Updated 3 months ago
- A tool for mapping cyber crime☆152Updated 5 months ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆82Updated last month
- Cyber threat intelligence tool suite.☆42Updated 5 months ago
- Protection against HTML smuggling attacks.☆99Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆260Updated 3 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 4 months ago
- Living Off Security Tools☆51Updated 10 months ago
- ASR Configurator, Essentials and Atomic Testing☆91Updated 5 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆57Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 6 months ago
- AppLocker Policy Generator☆20Updated 3 weeks ago
- A repository of credential stealer formats☆226Updated 3 months ago
- God Mode Detection Rules☆134Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆454Updated last week
- Knowledge base on cybercriminal concealment techniques☆76Updated 4 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆143Updated this week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆253Updated 2 weeks ago
- An index of publicly available and open-source threat detection rulesets.☆125Updated 5 months ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆89Updated last month